SlideShare a Scribd company logo
voipSecurity
Ridhvesh Shethwala – 15mcei27
Outlines
īƒŧIntroduction
īƒŧWhat is Voip.?
īƒŧHow Voip works.?
īƒŧProtocol used in Voip
īƒŧSecurity attack on Voip system
īƒŧHow we can prevent it.?
īƒŧConclusion
īƒŧReference
Network Features PSTN (Voice) VoIP (Voice)
Switch Circuit Switched Packet Switched
Connection Connection Oriented Connection Oriented
Bit Rate Fixed and low<=64kb/s Standard Bit Rate
Bursts Nonexistent
Error tolerance User error control Self error Control
Info resending Can not (real time) It Can
Delay Must be low and stable Very Less Delay
What is voip.?
īƒŧVoIP (Voice Over Internet Protocol) is an IP network
based voice transmission technology, instead of the
traditional analog telephone line, it allows people to
make telephone calls through broadband internet
connections.
īƒŧIn other words, just installing network telephone
software on the PCs at each end, people can talk
through to each other through the IP network.
īƒŧWith the development of network technology,
network IP telephony grew from PC-PC to IP-PSTN,
PSTN-IP, PSTN- PSTN and IP-IP, etc.
Voip security
How Voip
works.?
īƒŧAnalog Signal
īƒŧConverting Analog to Digital Signal
īƒŧCompress
īƒŧEncode
īƒŧPacketization
īƒŧTransmitted through IP Network
īƒŧDecode
īƒŧDecompress
īƒŧConverting Digital to Analog Signal
HowVoip
works.?
(Cont.)
Protocolusedin
Voip.
īƒŧRTP
īƒŧSIP
īƒŧMGCP
īƒŧH.323
RTP
īƒŧReal-TimeTransport Protocol (RTP) is an internet
standard protocol, used to transfer real time data, such
as audio and video. It can be used for IP telephony.
īƒŧRTP includes two parts: data and control.The control
part is called RealTime Control Protocol (RTCP).
īƒŧVoIP uses protocols such as real-time protocol (RTP)
and H.323 to deliver packets over the internet.
īƒŧIt provides support for real-time applications, includes
timing reconstruction, loss detection, security and
content identification.
RTP
(Cont.)
īƒŧRTP Header contains information of the payload, such as
the source address, size, encoding type, etc.
īƒŧTo transfer RTP packet on the network, we need to use User
Datagram Protocol (UDP) to create a UDP header.To
transfer UDP packet over IP network, we also need to create
an IP header.
RTP Data structure RTP Data in IP packet
RTP
(Cont.)
RTP FEATURES:-
īƒŧTo provide end-to-end delivery service for real time data,
such as audio and video.
īƒŧRTP uses time stamps and sequence numbers to implement
reliable delivery, flow control and congestion control.
īƒŧRTP is only a protocol framework, it is open to new
multimedia software.
īƒŧRTP and RTCP provide functionalities to deliver real time
data. RTP and RTCP aren’t responsible for synchronization,
or something like it which is the higher level task.
RTCP
īƒŧRealTime Control Protocol carries control information,
which is used to manage the QoS.
īƒŧIt provides supports for applications such as real-time
conference.
īƒŧThe supports include source identification, multicast-
to-unicast translator, and different media streams
synchronization.
īƒŧThere are five types of RTCP packets:-
I. RR: Receive Report
II. SR: Sender Report.
III. SDES: Source Description Items.
IV. BYE: used to indicate that participation is finished.
V. APP: application specified functions.
H.323
īƒŧH.323 is a set of protocols for voice, video, and data
conferencing over packet-based networks such as the
Internet.
īƒŧThe H.323 protocol stack is designed to operate above
the transport layer of the underlying network.
īƒŧH.323 can be used on top of any packet-based network
transport like Ethernet,TCP/UDP/IP, ATM, and Frame
Relay to provide real-time multimedia communication.
H.323 uses the Internet Protocol (IP) for inter-network
conferencing.
H.323
(cont.)
Scope of H.323
īƒŧPoint-to-point and multipoint conferencing support:
īƒŧInter-network interoperability:
īƒŧHeterogeneous client capabilities
īƒŧAudio and video codecs:
īƒŧManagement and accounting support:
īƒŧSecurity:
īƒŧSupplementary services
Voip security
H.323
(CONT.)
īƒŧAuthentication under H.323 can be either symmetric
encryption- based or subscription-based.
īƒŧFor symmetric encryption-based authentication, prior
contact between the communicating entities is not
required because the protocol uses Diffie-Hellman key-
exchange to generate a shared secret identity between
the two entities.
īƒŧWith reference to the H.235 recommendation, a
subscription-based authentication requires a prior
shared secret identity, and there are three variations of
this:
ī‚– Password-based with symmetric encryption,
ī‚– Password-based with hashing, and
ī‚– Certificate-based with signatures
MGCP
īƒŧMedia Gateway Control Protocol (MGCP) is a
protocol used for controllingVoice over IP (VoIP)
Gateways from external call control elements.
īƒŧMGCP is the emerging protocol that is receiving wide
interest from both the voice and data industries.
īƒŧMGCP is a protocol for controlling media gateways
from call agents. It superseded the Simple Gateway
Control Protocol (SGCP) .
īƒŧIn aVoIP system, MGCP can be used with SIP or H.323.
SIP or H.323 will provide the call control functionality
and MGCP can be used to manage media
establishment in media gateways.
MGCP
(cont.)
īƒŧCharacteristics of MGCP:
-- A master/slave protocol.
-- Assumes limited intelligence at the edge (endpoints)
and intelligence at the core (call agent).
-- between call agents and media gateways.
-- Differs from SIP and H.323 which are peer-to-peer
protocols.
-- Interoperates with SIP and H.323.
Voip security
MGCP
(cont.)
īƒŧMGCP provides:
ī‚– Call preservation—calls are maintained during failover
and failback
ī‚– Dial plan simplification—no dial peer configuration is
required on the gateway
ī‚– Hook flash transfer
ī‚– Tone on hold
ī‚– MGCP supports encryption of voice traffic.
ī‚– MGCP supports Q Interface Signalling Protocol (QSIG)
functionality.
SIP
īƒŧThe Session Initiation Protocol is a text-based
signaling communications protocol, which is used to
creation, management and terminations of each
session.
īƒŧIt is responsible for smooth transmission of data
packets over the network. It considers the request
made by the user to make a call and then establishes
connection between two or multiple users.When the
call is complete, it destroys the session.
SIP
(CONT.)
īƒŧSIP can be used for two party (unicast) or multi party
(multicast) sessions. It works in along with other
application layer protocols that identify and carry the
session media.
īƒŧThe protocol itself provides reliability and does not
depend onTCP for reliability. Also, it depends on the
Session Description Protocol (SDP) which is
responsible for the negotiation for the codec
identification
Voip security
SIP
(CONT.)
īƒŧSIP Messages:-
ī‚– REGISTER – Registers a user with a SIP server
ī‚– INVITE – Used to invite to participate in a Call session
ī‚– ACK – Acknowledge an INVITE request
ī‚– CANCEL – Cancel a pending request
ī‚– OPTIONS – Lists the information about the capabilities
of the caller
ī‚– BYE –Terminates a connection
Voip security
SIP
(CONT.)
īƒŧServices Provided by the SIP
ī‚– Locate User
ī‚– Session Establishment
ī‚– Session Setup Negotiation
ī‚– Modify Session
ī‚– Teardown/End Session
Security Aspects ofVoIP
Security
Aspectsin
VoIP
Server authentication:
īƒŧSinceVoIP users typically communicate with each
other through someVoIP infrastructure that involves
servers (gatekeepers, multicast units, gateways), users
need to know if they are talking with the proper server
and/or with the correct service provider.This applies to
both fixed and mobile users.
Security
Aspectsin
VoIP
(cont.)
Voice confidentiality
īƒŧThis is realized through encryption of the voice packets
and protects against eavesdropping. In general, the
media packets of multimedia applications are
encrypted as well as voice data. Advanced protection
of media packets also includes authentication/integrity
protection of the payloads.
Security
Aspectsin
VoIP
(cont.)
Call authorization:
īƒŧThis is the decision-making process to determine if
the user/terminal is actually permitted to use a service
feature or a network resource (QoS, bandwidth, codec,
etc.). Most often authentication and authorization
functions are used together to make an access control
decision. Authentication and authorization help to
thwart attacks like masquerade, misuse and fraud,
manipulation and denial-of-service.
Security
Aspectsin
VoIP
(cont.)
Key Management:
ī‚– This includes not only all tasks that are necessary for
securely distributing keying material to users and
servers, but also tasks like updating expired keys and
replacing lost keys. Key management may be a
separate task from theVoIP application (password
provisioning) or may be integrated with signalling when
security profiles with security capabilities are being
dynamically negotiated and session-based keys are to
be distributed.
Security
Aspectsin
VoIP
(cont.)
Masquerading:
īƒŧA masquerade is the pretense of an entity to be
another entity. Masquerading can lead to charging
fraud, breach of privacy, and breach of integrity. This
attack can be carried out by hijacking a link after
authentication has been performed, or by
eavesdropping and subsequent replaying of
authentication information. Using a masquerade
attack, an attacker can gain unauthorized access to
VoIP services. An attacker can steal the identity of a
real user and obtain access by masquerading as the
real user.
Security
Aspectsin
VoIP
(cont.)
Eavesdropping:
īƒŧEavesdropping attacks describe a method by which an
attacker is able to monitor the entire signaling and/or
data stream between two or moreVoIP endpoints, but
cannot or does not alter the data itself.
Security
Aspectsin
VoIP
(cont.)
Interception and Modification:
īƒŧThese classes of attacks describe a method by which
an attacker can see the entire signaling and data
stream between two endpoints, and can also modify
the traffic as an intermediary in the conversation.
Security
Aspectsin
VoIP
(cont.)
Denial of Service:
īƒŧA denial of service (DoS) attack is an attack that is
conducted to deliberately cause loss of availability of a
service. We identify DoS attacks at several levels;
transport-level, server level, signaling level.
īƒŧTransport level: An IP-level DoS attack may be carried
out by flooding a target, e.g. by ping of death or Smurf
attack.
īƒŧServer level: Servers may be rendered unusable by
modifying stored information in order to prevent
authorized users from accessing the service.
Security
Aspectsin
VoIP
(cont.)
Misrepresentation:
īƒŧThe term misrepresentation is generically used to
mean false or misleading communication.
Misrepresentation includes the delivery of information
which is false as to the identity, authority or rights of
another party or false as to the content of information
communicated.
Security
Solutionin
VoIP
īƒŧ Confidentiality: Confidentiality can be achieved
by using different encryptions techniques, which
provide user authentication. For ex: a hash record key
with a shared secret is used between the parties to
prevent malicious users from call monitoring. Such
measures should be taken to get confidentiality.
īƒŧIntegrity: To protect the source of data we use
Integrity that provides user authentication. It is used
for origin integrity, and without integrity control, any
non-trusted system has the ability to modify the
different contents without any notice.
Security
Solutionin
VoIP
(cont.)
HTTP Digest Authentication:
īƒŧSIP uses HTTP Digest Authentication method to
authenticate data, such as password. HTTP Digest
authentication offers one-way message authentication
and replay protection, but it doesn’t protect message
integrity and confidentiality.
īƒŧBy transmitting an MD5 or SHA-1 digest of the secret
password and a random challenge string, HTTP Digest
can protect password.
īƒŧAlthough HTTP digest authentication has the
advantage that the identity of the user is encrypted,
and transmitted in cipher text, but if the password is
short or weak, by intercepting the hash value, the
password can be decrypted easily.
Security
Solutionin
VoIP
(cont.)
S/MIME:
(Secure/Multi-Purpose Internet Mail Extension)
īƒŧ MIME bodies are inserted into SIP messages. MIME
defines mechanisms for integrity protection and
encryption of the MIME contents.
īƒŧSIP can use S/MIME to enable mechanisms like public
key distribution, authentication and integrity
protection, confidentiality of SIP signaling data.
S/MIME relies heavily on the certification of the end
user.
īƒŧMoreover self certification is vulnerable to man-in-the-
middle attack, so either the certificates from known
public certification authorities (CAs) or private CAs
should be used, so the S/MIME mechanism is seriously
limited.
Security
Solutionin
VoIP
(cont.)
Firewall
īƒŧFirewalls are usually used to protect trusted network
from un-trusted network. Firewalls usually work on IP
andTCP/UDP layer, it determines what types of traffic
is allowed and which system are allowed to
communicate. Firewall doesn’t monitor the application
layer. Since SIP needs to open ports dynamically, this
enhances the complexity of firewall, as the firewall
must open and close ports dynamically.
Security
Solutionin
VoIP
(cont.)
Some OtherWaysTo Protect:-
īƒŧTo prevent message alteration established secured
communication channel between communicating
parties.To prevent media alteration and degradation
use SRTP protocol.
īƒŧUse secured devices for communication and switching
of voice as well as data.
īƒŧUse Strong authentication and password at device
level.
īƒŧChange defaults passwords and enable SIP
authentication. Use the devices which support SRTP
cipher technique.
Security
Solutionin
VoIP
(cont.)
īƒŧUseVLAN with 802.1x in internet to split data and
voice traffic.
īƒŧDisableTelnet in the phone configuration, allow only
to administrators.To avoid message tampering and
voice pharming attack use encrypted transmitted data
using encryption mechanisms like IPsec,TLS and
S/MIME.
Security
Solutionin
VoIP
(cont.)
īƒŧ for a secure session inVOIP we should take
following measures:
ī‚– Use and maintain anti-virus and anti-spyware programs.
ī‚– Do not open unknown attachments of mails which have
unknown or fake IDs.
ī‚– Verify the authenticity and security of downloaded files
and new software. Configure your web browser(s)
properly by enabling/disabling the necessary cookies.
ī‚– Active firewall session in your network and always place
your back-up securely.
ī‚– Create strong passwords and change them regularly
and do not disclose such information publicly.
Conclusion
īƒŧVoIP system is low cost and less configuration than
PSTN Network.VoIP is EmergingTechnology and
contain some loop hopes so there are some attacks can
possible on it. As in futureVoIP Replace the PSTN
system it need better security. Using some of Secure
protocols like SRTP and some advance Encryption
standards, using firewall, end-to-end encryption we
can make it secure.
References
īƒŧCisco, “Overview of the Session Initiation Protocol”, September,
(2002)
īƒŧDavid Gurle, Olivier Hersent, “MediaGateway to Media Controller
Protocols”,August,(2003).
īƒŧ Rohit Dhamankar Intrusion Prevention: The Future ofVoIP Security
White paper (2010)
īƒŧ PorterT “Threats toVoIP CommunicationSystems, Syngress Force
EmergingThreat Analysis” ,pg. 3-25. (2006).
īƒŧMark Collier,ChiefTechnologyOfficer Secure Logix Corporation,
"BasicVulnerability Issues for SIP Security.pdf”,1 March (2005).
īƒŧVoIP Security and PrivacyThreat Taxonomy "Public Release 1.0
24 October 2005" (access 29 Jan 2012)
Voip security

More Related Content

PPT
WAN Technologies slide show
NavleshKumar singh
 
ODP
Voip introduction
daksh bhatt
 
PPTX
Voip powerpoint
GW1992
 
PPT
VOIP BASIC
dhara patel
 
PPTX
Voip
Yasin Virani
 
PPTX
VOIP
Gruppo Banca Sella
 
PPTX
Session initiation-protocol
Santhosh Somu
 
PDF
Introduction to VoIP, RTP and SIP
ThousandEyes
 
WAN Technologies slide show
NavleshKumar singh
 
Voip introduction
daksh bhatt
 
Voip powerpoint
GW1992
 
VOIP BASIC
dhara patel
 
Voip
Yasin Virani
 
Session initiation-protocol
Santhosh Somu
 
Introduction to VoIP, RTP and SIP
ThousandEyes
 

What's hot (20)

PPTX
VoIP – vulnerabilities and attacks
n|u - The Open Security Community
 
PPTX
Voice over internet protocol (VoIP)
Namra Afzal
 
PPT
VoIP Security
Dayanand Prabhakar
 
PPTX
Voice over Internet Protocol (VoIP)
Fringe Division
 
PPT
VOIP
guest43d211
 
PPTX
Voip
Harry Sunarsa
 
PDF
Calling VoWiFi... The Next Mobile Operator Service is here...
Cisco Canada
 
PPT
Sip
Anirban Roy
 
PDF
Kamailio - Load Balancing Load Balancers
Daniel-Constantin Mierla
 
PPT
Ip telephony
Deevena Dayaal
 
PPTX
Voip
Muhammad Hamza
 
PDF
SIP Testing with FreeSWITCH
Moises Silva
 
PPT
Dhcp presentation 01
maverick4489
 
ODP
Expanding Asterisk with Kamailio
Fred Posner
 
PPTX
Packet sniffers
Kunal Thakur
 
PPTX
Nat
Humaira Saleem
 
PDF
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
 
PPT
Arp spoofing
Luthfi Widyanto
 
PPTX
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
PDF
Hacking With Nmap - Scanning Techniques
amiable_indian
 
VoIP – vulnerabilities and attacks
n|u - The Open Security Community
 
Voice over internet protocol (VoIP)
Namra Afzal
 
VoIP Security
Dayanand Prabhakar
 
Voice over Internet Protocol (VoIP)
Fringe Division
 
VOIP
guest43d211
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Cisco Canada
 
Kamailio - Load Balancing Load Balancers
Daniel-Constantin Mierla
 
Ip telephony
Deevena Dayaal
 
SIP Testing with FreeSWITCH
Moises Silva
 
Dhcp presentation 01
maverick4489
 
Expanding Asterisk with Kamailio
Fred Posner
 
Packet sniffers
Kunal Thakur
 
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
 
Arp spoofing
Luthfi Widyanto
 
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Ad

Similar to Voip security (20)

PDF
Voice over IP
Togis UAB Ltd
 
PPTX
VOIP security
Rohit Gurjar
 
PDF
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Sean Flores
 
PPT
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
PDF
Raisul Haq Rajib (063435056)
mashiur
 
PDF
Security Issues In Voip
Waqas Daar
 
PPS
A glance-at-voip
Nicola Marinelli
 
PPTX
Seminar on Voip Challenges and Countermeasures
Deepak Mishra
 
PPTX
Voice over internet protocol (voip)3
Vishnu M Dinesan
 
PPTX
Voice over IP (VOIP)
Ahmed Ayman
 
PPT
Voice over IP: Issues and Protocols
Videoguy
 
DOCX
VoIP Research Paper
Aashish Pande
 
PDF
VoIP for Beginners
Kingfin Enterprises Limited
 
PPT
Voip
Abd17m
 
PDF
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
PPT
Voippresentation
eliran2
 
PDF
VOIP services
Pankaj Saharan
 
PPTX
voice over internet protocol
jomin mathew
 
PPT
VOIP
Augusto Seixas
 
PDF
ccna project
Amardeep Singh Brar
 
Voice over IP
Togis UAB Ltd
 
VOIP security
Rohit Gurjar
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Sean Flores
 
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
Raisul Haq Rajib (063435056)
mashiur
 
Security Issues In Voip
Waqas Daar
 
A glance-at-voip
Nicola Marinelli
 
Seminar on Voip Challenges and Countermeasures
Deepak Mishra
 
Voice over internet protocol (voip)3
Vishnu M Dinesan
 
Voice over IP (VOIP)
Ahmed Ayman
 
Voice over IP: Issues and Protocols
Videoguy
 
VoIP Research Paper
Aashish Pande
 
VoIP for Beginners
Kingfin Enterprises Limited
 
Voip
Abd17m
 
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
Voippresentation
eliran2
 
VOIP services
Pankaj Saharan
 
voice over internet protocol
jomin mathew
 
ccna project
Amardeep Singh Brar
 
Ad

More from Shethwala Ridhvesh (6)

PPTX
Politics in india
Shethwala Ridhvesh
 
PPTX
A Maximum Flow Min cut theorem for Optimizing Network
Shethwala Ridhvesh
 
PPTX
TCP/IP performance over Optical Fiber
Shethwala Ridhvesh
 
PPTX
Col wiz ppt
Shethwala Ridhvesh
 
PPTX
Anti phishing
Shethwala Ridhvesh
 
PPT
Green computing_ridhvesh
Shethwala Ridhvesh
 
Politics in india
Shethwala Ridhvesh
 
A Maximum Flow Min cut theorem for Optimizing Network
Shethwala Ridhvesh
 
TCP/IP performance over Optical Fiber
Shethwala Ridhvesh
 
Col wiz ppt
Shethwala Ridhvesh
 
Anti phishing
Shethwala Ridhvesh
 
Green computing_ridhvesh
Shethwala Ridhvesh
 

Recently uploaded (20)

PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Ppt for engineering students application on field effect
lakshmi.ec
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Inventory management chapter in automation and robotics.
atisht0104
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 

Voip security

  • 2. Outlines īƒŧIntroduction īƒŧWhat is Voip.? īƒŧHow Voip works.? īƒŧProtocol used in Voip īƒŧSecurity attack on Voip system īƒŧHow we can prevent it.? īƒŧConclusion īƒŧReference
  • 3. Network Features PSTN (Voice) VoIP (Voice) Switch Circuit Switched Packet Switched Connection Connection Oriented Connection Oriented Bit Rate Fixed and low<=64kb/s Standard Bit Rate Bursts Nonexistent Error tolerance User error control Self error Control Info resending Can not (real time) It Can Delay Must be low and stable Very Less Delay
  • 4. What is voip.? īƒŧVoIP (Voice Over Internet Protocol) is an IP network based voice transmission technology, instead of the traditional analog telephone line, it allows people to make telephone calls through broadband internet connections. īƒŧIn other words, just installing network telephone software on the PCs at each end, people can talk through to each other through the IP network. īƒŧWith the development of network technology, network IP telephony grew from PC-PC to IP-PSTN, PSTN-IP, PSTN- PSTN and IP-IP, etc.
  • 6. How Voip works.? īƒŧAnalog Signal īƒŧConverting Analog to Digital Signal īƒŧCompress īƒŧEncode īƒŧPacketization īƒŧTransmitted through IP Network īƒŧDecode īƒŧDecompress īƒŧConverting Digital to Analog Signal
  • 9. RTP īƒŧReal-TimeTransport Protocol (RTP) is an internet standard protocol, used to transfer real time data, such as audio and video. It can be used for IP telephony. īƒŧRTP includes two parts: data and control.The control part is called RealTime Control Protocol (RTCP). īƒŧVoIP uses protocols such as real-time protocol (RTP) and H.323 to deliver packets over the internet. īƒŧIt provides support for real-time applications, includes timing reconstruction, loss detection, security and content identification.
  • 10. RTP (Cont.) īƒŧRTP Header contains information of the payload, such as the source address, size, encoding type, etc. īƒŧTo transfer RTP packet on the network, we need to use User Datagram Protocol (UDP) to create a UDP header.To transfer UDP packet over IP network, we also need to create an IP header. RTP Data structure RTP Data in IP packet
  • 11. RTP (Cont.) RTP FEATURES:- īƒŧTo provide end-to-end delivery service for real time data, such as audio and video. īƒŧRTP uses time stamps and sequence numbers to implement reliable delivery, flow control and congestion control. īƒŧRTP is only a protocol framework, it is open to new multimedia software. īƒŧRTP and RTCP provide functionalities to deliver real time data. RTP and RTCP aren’t responsible for synchronization, or something like it which is the higher level task.
  • 12. RTCP īƒŧRealTime Control Protocol carries control information, which is used to manage the QoS. īƒŧIt provides supports for applications such as real-time conference. īƒŧThe supports include source identification, multicast- to-unicast translator, and different media streams synchronization. īƒŧThere are five types of RTCP packets:- I. RR: Receive Report II. SR: Sender Report. III. SDES: Source Description Items. IV. BYE: used to indicate that participation is finished. V. APP: application specified functions.
  • 13. H.323 īƒŧH.323 is a set of protocols for voice, video, and data conferencing over packet-based networks such as the Internet. īƒŧThe H.323 protocol stack is designed to operate above the transport layer of the underlying network. īƒŧH.323 can be used on top of any packet-based network transport like Ethernet,TCP/UDP/IP, ATM, and Frame Relay to provide real-time multimedia communication. H.323 uses the Internet Protocol (IP) for inter-network conferencing.
  • 14. H.323 (cont.) Scope of H.323 īƒŧPoint-to-point and multipoint conferencing support: īƒŧInter-network interoperability: īƒŧHeterogeneous client capabilities īƒŧAudio and video codecs: īƒŧManagement and accounting support: īƒŧSecurity: īƒŧSupplementary services
  • 16. H.323 (CONT.) īƒŧAuthentication under H.323 can be either symmetric encryption- based or subscription-based. īƒŧFor symmetric encryption-based authentication, prior contact between the communicating entities is not required because the protocol uses Diffie-Hellman key- exchange to generate a shared secret identity between the two entities. īƒŧWith reference to the H.235 recommendation, a subscription-based authentication requires a prior shared secret identity, and there are three variations of this: ī‚– Password-based with symmetric encryption, ī‚– Password-based with hashing, and ī‚– Certificate-based with signatures
  • 17. MGCP īƒŧMedia Gateway Control Protocol (MGCP) is a protocol used for controllingVoice over IP (VoIP) Gateways from external call control elements. īƒŧMGCP is the emerging protocol that is receiving wide interest from both the voice and data industries. īƒŧMGCP is a protocol for controlling media gateways from call agents. It superseded the Simple Gateway Control Protocol (SGCP) . īƒŧIn aVoIP system, MGCP can be used with SIP or H.323. SIP or H.323 will provide the call control functionality and MGCP can be used to manage media establishment in media gateways.
  • 18. MGCP (cont.) īƒŧCharacteristics of MGCP: -- A master/slave protocol. -- Assumes limited intelligence at the edge (endpoints) and intelligence at the core (call agent). -- between call agents and media gateways. -- Differs from SIP and H.323 which are peer-to-peer protocols. -- Interoperates with SIP and H.323.
  • 20. MGCP (cont.) īƒŧMGCP provides: ī‚– Call preservation—calls are maintained during failover and failback ī‚– Dial plan simplification—no dial peer configuration is required on the gateway ī‚– Hook flash transfer ī‚– Tone on hold ī‚– MGCP supports encryption of voice traffic. ī‚– MGCP supports Q Interface Signalling Protocol (QSIG) functionality.
  • 21. SIP īƒŧThe Session Initiation Protocol is a text-based signaling communications protocol, which is used to creation, management and terminations of each session. īƒŧIt is responsible for smooth transmission of data packets over the network. It considers the request made by the user to make a call and then establishes connection between two or multiple users.When the call is complete, it destroys the session.
  • 22. SIP (CONT.) īƒŧSIP can be used for two party (unicast) or multi party (multicast) sessions. It works in along with other application layer protocols that identify and carry the session media. īƒŧThe protocol itself provides reliability and does not depend onTCP for reliability. Also, it depends on the Session Description Protocol (SDP) which is responsible for the negotiation for the codec identification
  • 24. SIP (CONT.) īƒŧSIP Messages:- ī‚– REGISTER – Registers a user with a SIP server ī‚– INVITE – Used to invite to participate in a Call session ī‚– ACK – Acknowledge an INVITE request ī‚– CANCEL – Cancel a pending request ī‚– OPTIONS – Lists the information about the capabilities of the caller ī‚– BYE –Terminates a connection
  • 26. SIP (CONT.) īƒŧServices Provided by the SIP ī‚– Locate User ī‚– Session Establishment ī‚– Session Setup Negotiation ī‚– Modify Session ī‚– Teardown/End Session
  • 28. Security Aspectsin VoIP Server authentication: īƒŧSinceVoIP users typically communicate with each other through someVoIP infrastructure that involves servers (gatekeepers, multicast units, gateways), users need to know if they are talking with the proper server and/or with the correct service provider.This applies to both fixed and mobile users.
  • 29. Security Aspectsin VoIP (cont.) Voice confidentiality īƒŧThis is realized through encryption of the voice packets and protects against eavesdropping. In general, the media packets of multimedia applications are encrypted as well as voice data. Advanced protection of media packets also includes authentication/integrity protection of the payloads.
  • 30. Security Aspectsin VoIP (cont.) Call authorization: īƒŧThis is the decision-making process to determine if the user/terminal is actually permitted to use a service feature or a network resource (QoS, bandwidth, codec, etc.). Most often authentication and authorization functions are used together to make an access control decision. Authentication and authorization help to thwart attacks like masquerade, misuse and fraud, manipulation and denial-of-service.
  • 31. Security Aspectsin VoIP (cont.) Key Management: ī‚– This includes not only all tasks that are necessary for securely distributing keying material to users and servers, but also tasks like updating expired keys and replacing lost keys. Key management may be a separate task from theVoIP application (password provisioning) or may be integrated with signalling when security profiles with security capabilities are being dynamically negotiated and session-based keys are to be distributed.
  • 32. Security Aspectsin VoIP (cont.) Masquerading: īƒŧA masquerade is the pretense of an entity to be another entity. Masquerading can lead to charging fraud, breach of privacy, and breach of integrity. This attack can be carried out by hijacking a link after authentication has been performed, or by eavesdropping and subsequent replaying of authentication information. Using a masquerade attack, an attacker can gain unauthorized access to VoIP services. An attacker can steal the identity of a real user and obtain access by masquerading as the real user.
  • 33. Security Aspectsin VoIP (cont.) Eavesdropping: īƒŧEavesdropping attacks describe a method by which an attacker is able to monitor the entire signaling and/or data stream between two or moreVoIP endpoints, but cannot or does not alter the data itself.
  • 34. Security Aspectsin VoIP (cont.) Interception and Modification: īƒŧThese classes of attacks describe a method by which an attacker can see the entire signaling and data stream between two endpoints, and can also modify the traffic as an intermediary in the conversation.
  • 35. Security Aspectsin VoIP (cont.) Denial of Service: īƒŧA denial of service (DoS) attack is an attack that is conducted to deliberately cause loss of availability of a service. We identify DoS attacks at several levels; transport-level, server level, signaling level. īƒŧTransport level: An IP-level DoS attack may be carried out by flooding a target, e.g. by ping of death or Smurf attack. īƒŧServer level: Servers may be rendered unusable by modifying stored information in order to prevent authorized users from accessing the service.
  • 36. Security Aspectsin VoIP (cont.) Misrepresentation: īƒŧThe term misrepresentation is generically used to mean false or misleading communication. Misrepresentation includes the delivery of information which is false as to the identity, authority or rights of another party or false as to the content of information communicated.
  • 37. Security Solutionin VoIP īƒŧ Confidentiality: Confidentiality can be achieved by using different encryptions techniques, which provide user authentication. For ex: a hash record key with a shared secret is used between the parties to prevent malicious users from call monitoring. Such measures should be taken to get confidentiality. īƒŧIntegrity: To protect the source of data we use Integrity that provides user authentication. It is used for origin integrity, and without integrity control, any non-trusted system has the ability to modify the different contents without any notice.
  • 38. Security Solutionin VoIP (cont.) HTTP Digest Authentication: īƒŧSIP uses HTTP Digest Authentication method to authenticate data, such as password. HTTP Digest authentication offers one-way message authentication and replay protection, but it doesn’t protect message integrity and confidentiality. īƒŧBy transmitting an MD5 or SHA-1 digest of the secret password and a random challenge string, HTTP Digest can protect password. īƒŧAlthough HTTP digest authentication has the advantage that the identity of the user is encrypted, and transmitted in cipher text, but if the password is short or weak, by intercepting the hash value, the password can be decrypted easily.
  • 39. Security Solutionin VoIP (cont.) S/MIME: (Secure/Multi-Purpose Internet Mail Extension) īƒŧ MIME bodies are inserted into SIP messages. MIME defines mechanisms for integrity protection and encryption of the MIME contents. īƒŧSIP can use S/MIME to enable mechanisms like public key distribution, authentication and integrity protection, confidentiality of SIP signaling data. S/MIME relies heavily on the certification of the end user. īƒŧMoreover self certification is vulnerable to man-in-the- middle attack, so either the certificates from known public certification authorities (CAs) or private CAs should be used, so the S/MIME mechanism is seriously limited.
  • 40. Security Solutionin VoIP (cont.) Firewall īƒŧFirewalls are usually used to protect trusted network from un-trusted network. Firewalls usually work on IP andTCP/UDP layer, it determines what types of traffic is allowed and which system are allowed to communicate. Firewall doesn’t monitor the application layer. Since SIP needs to open ports dynamically, this enhances the complexity of firewall, as the firewall must open and close ports dynamically.
  • 41. Security Solutionin VoIP (cont.) Some OtherWaysTo Protect:- īƒŧTo prevent message alteration established secured communication channel between communicating parties.To prevent media alteration and degradation use SRTP protocol. īƒŧUse secured devices for communication and switching of voice as well as data. īƒŧUse Strong authentication and password at device level. īƒŧChange defaults passwords and enable SIP authentication. Use the devices which support SRTP cipher technique.
  • 42. Security Solutionin VoIP (cont.) īƒŧUseVLAN with 802.1x in internet to split data and voice traffic. īƒŧDisableTelnet in the phone configuration, allow only to administrators.To avoid message tampering and voice pharming attack use encrypted transmitted data using encryption mechanisms like IPsec,TLS and S/MIME.
  • 43. Security Solutionin VoIP (cont.) īƒŧ for a secure session inVOIP we should take following measures: ī‚– Use and maintain anti-virus and anti-spyware programs. ī‚– Do not open unknown attachments of mails which have unknown or fake IDs. ī‚– Verify the authenticity and security of downloaded files and new software. Configure your web browser(s) properly by enabling/disabling the necessary cookies. ī‚– Active firewall session in your network and always place your back-up securely. ī‚– Create strong passwords and change them regularly and do not disclose such information publicly.
  • 44. Conclusion īƒŧVoIP system is low cost and less configuration than PSTN Network.VoIP is EmergingTechnology and contain some loop hopes so there are some attacks can possible on it. As in futureVoIP Replace the PSTN system it need better security. Using some of Secure protocols like SRTP and some advance Encryption standards, using firewall, end-to-end encryption we can make it secure.
  • 45. References īƒŧCisco, “Overview of the Session Initiation Protocol”, September, (2002) īƒŧDavid Gurle, Olivier Hersent, “MediaGateway to Media Controller Protocols”,August,(2003). īƒŧ Rohit Dhamankar Intrusion Prevention: The Future ofVoIP Security White paper (2010) īƒŧ PorterT “Threats toVoIP CommunicationSystems, Syngress Force EmergingThreat Analysis” ,pg. 3-25. (2006). īƒŧMark Collier,ChiefTechnologyOfficer Secure Logix Corporation, "BasicVulnerability Issues for SIP Security.pdf”,1 March (2005). īƒŧVoIP Security and PrivacyThreat Taxonomy "Public Release 1.0 24 October 2005" (access 29 Jan 2012)